We rely heavily on our Sponsor's financial, accounting, treasury, communications and other data processing systems, technology infrastructure, as well as various hardware and software platforms. Some of these systems are managed by us or our Sponsor but other critical systems and related services, such as cloud computing, are provided by third-party providers that we and our Sponsor do not control. These systems may fail to operate properly or become disabled or compromised as a result of tampering, a cyberattack, a security breach or otherwise. Our Sponsor may experience, and certain of our third-party providers have experienced, from time to time cyberattacks, such as phishing attacks, which are continuing to increase in sophistication, frequency and impact. A significant attack on us, our Sponsor's or service providers' systems could permit unauthorized access to our proprietary information or personal information of our stockholders, lenders or borrowers (and their beneficial owners), destroy data or disable, degrade or sabotage our or our Sponsor's systems, including through the introduction of computer viruses and other malicious code (such as ransomware). Attacks by threat actors are launched from a range of vectors, such as social engineering/phishing, company insiders, suppliers or providers, and as a result of human or technological error, including misconfigurations, bugs, or other vulnerabilities in software and hardware and originate from a wide variety of sources, including cyber criminals, state-sponsored hackers, hacktivists and other outside parties.
Our information and technology systems as well as those of our Sponsor and other related parties, such as service providers, are vulnerable to damage or interruption from cybersecurity breaches, computer viruses or other malicious code, network failures, computer and telecommunication failures, infiltration by unauthorized persons and other security breaches, usage errors by their respective professionals or service providers, power, communications or other service outages and catastrophic events such as fires, tornadoes, floods, hurricanes and earthquakes. As a result of the increased demand for remote working arrangements and our general reliance on internet technology, which create additional opportunities for cyber criminals to exploit vulnerabilities, we and our Sponsor face increased cybersecurity risks. We and others in our industry are targets for threat actors because we hold a significant amount of confidential and sensitive information. As a result, we and our Sponsor face a heightened risk of a security breach or disruption with respect to this information. If successful, these types of attacks on our or our Sponsor's network or other systems could have a material adverse effect on us, due to, among other things, the loss of investor or proprietary data, interruptions or delays in the operation of our business and damage to our reputation. The costs to mitigate network security problems, bugs, viruses, worms, malicious software programs, and security vulnerabilities could be significant and are likely to increase in the future. These costs include, but are not limited to, retaining the services of cybersecurity providers; compliance costs arising out of existing and future cybersecurity, data protection and privacy laws and regulations; and costs related to maintaining redundant networks, data backups and other damage-mitigation measures. While our Sponsor is generally responsible for such costs in the first instance, we have indemnified the Sponsor for certain losses that it may incur in connection with the operation of our business. Regardless, there can be no assurance that measures we or our Sponsor takes to ensure the integrity of our systems will provide protection, especially because cyberattack techniques used change frequently, or may not be recognized until successful, and are becoming more sophisticated - including by use of artificial intelligence - that circumvent security controls, evade detection and remove forensic evidence. As a result, we or our Sponsor may be unable to detect, investigate, remediate or recover from future attacks or incidents, or to avoid a material adverse impact to our information systems, confidential information or business.
If unauthorized parties gain access to this information and technology systems, they may be able to steal, publish, delete or modify private and sensitive information, including non-public personal information related to stockholders or borrowers (and their beneficial owners) and material non-public information. The security measures applied to our systems cannot guarantee protection against all cyber risks and, if compromised, could become inoperable for extended periods of time, cease to function properly or fail to adequately secure private information. We do not control the cybersecurity plans and systems put in place by third-party service providers, and these third-party service providers may have limited indemnification obligations to us or our Sponsor, each of which could be negatively impacted as a result. Breaches such as those involving covertly introduced malware, impersonation of authorized users and industrial or other espionage may not be identified even with sophisticated prevention and detection systems, potentially resulting in further harm and preventing them from being addressed appropriately. The failure of these systems or of disaster recovery plans for any reason could cause significant interruptions in our operations and result in a failure to maintain the security, confidentiality or privacy of sensitive data, including personal information relating to stockholders, material non-public information and the intellectual property and trade secrets and other sensitive information in the possession of us or our Manager. We could be required to make a significant investment to remedy the effects of any failures, harm to our reputations, legal claims that we and our Manager may be subjected to, regulatory action or enforcement arising out of applicable privacy and other laws, adverse publicity and other events that may materially and adversely affect us.
In addition, our business highly depends on information systems and technology. The costs related to cyber or other security threats or disruptions may not be fully insured or indemnified by other means. Although we maintain insurance policies, we cannot be certain that any or all of the costs and liabilities incurred in relation to any cybersecurity attack or incident will be covered or that applicable insurance will be available to us in the future on economically reasonable terms or at all. Many jurisdictions in which we operate have laws and regulations relating to data privacy, cybersecurity and protection of personal information. Some jurisdictions have also enacted laws requiring companies to notify individuals of data security breaches involving certain types of personal data. Breaches in security could potentially jeopardize confidential and other information processed and stored in, and transmitted through, our computer systems and networks (including information relating to us, our Manager, its employees, our investors, and business counterparties), or otherwise cause interruptions or malfunctions in our or our investors', our counterparties' or third parties' operations, which could result in significant losses, increased costs, disruption of our business, liability to our investors and other counterparties, regulatory intervention or reputational damage. Furthermore, if we or our Manager fail to comply with the relevant laws and regulations, it could result in regulatory investigations and penalties, which could lead to negative publicity and may cause our investors to lose confidence in the effectiveness of our or our Manager's security measures. Indeed, any adverse impact to the availability, integrity or confidentiality of our information systems or confidential information can result in legal claims or proceedings (such as class actions), regulatory investigations and enforcement actions, fines and penalties, negative reputational impacts that cause us to lose existing or future customers, and/or significant incident response, system restoration or remediation and future compliance costs. Any or all of the foregoing could materially adversely affect our business, operating results, and financial condition.
A disaster or a disruption in the infrastructure that supports our business, including a disruption involving electronic communications or other services used by us or third parties with whom we conduct business, could have a material adverse impact on our ability to continue to operate our business without interruption. Our and our Sponsor's disaster recovery programs may not be sufficient to mitigate the harm that may result from such a disaster or disruption. In addition, insurance and other safeguards might only partially reimburse us for our losses, if at all.